-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch CI System to GitHub Actions? #699
Comments
No objections here. |
this would be awesome! let's do it |
I think to start, I'll just setup an Action for the AWS hub's
I'll update this list as I remember what CI steps are encapsulated in I can also hold off on this if we want to have some other work done first, just let me know @TomAugspurger . |
Updates: from conversation with @tjcrone - #759 (comment) - I think it would be a good idea to separate the CI actions by build / deploy and AWS / GCP / OOI. If we only update the AWS hub's config, we shouldn't need to re-deploy GCP and OOI. This is reflected in work for #754 , which is only going to affect the AWS hub's |
So PRs #754 and #774 have set up a GitHub Action for building the AWS hub's Docker image and deploying the AWS hub. These are currently active on Since the actions are separate workflow files, there's increased readability, the actions can run in parallel, and we can specify a version of We will probably enable workflow triggering for |
This PR got closed by I think I have a fix: we don't need to push the image if the PR doesn't get merged, so I can remove the If that doesn't work, we can put the image test building piece back into CircleCI, where it always has access to the secrets. |
I didn't look too closely, but you can access secrets from a The potential problem that the version of the workflow on master is used. But I agree that not pushing till merge is probably the right move anyway. |
On the last cloud deployment call, we were thinking of switching the CI system from CircleCI to GitHub Actions. Some of the perks of that are:
hubploy
as a Docker imageThere was also some talk between @jhamman and myself about augmenting this with a new GitHub Action to do deployment statuses as a part of the CI system. This could replace the
staging
->prod
workflow. @jhamman had an example on a CarbonPlan repo. Here is the GitHub Action that performs a similar function, but with Vercel instead of the new Action.ping @TomAugspurger @scottyhq @rabernat, would love to hear your thoughts on this!
I've used
hubploy
in this manner for both hackweeks that I set up infrastructure for. It would require us to bundle everything underhubploy
or set up more Actions for interactions with other namespaces, but the Action looks a lot nicer: here is the Action from OceanHackWeek's Hub.The text was updated successfully, but these errors were encountered: